Sciweavers

2184 search results - page 214 / 437
» Modeling and Realizing Interoperability
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Provider Provisioned Overlay Networks and Their Utility in DoS Defense
—The current overlay deployment model supports minimal or no involvement by ISPs in overlay deployment and operation. This model rules out a richer set of interactions between th...
Jinu Kurian, Kamil Saraç
ICIP
2003
IEEE
14 years 9 months ago
Road network extraction in remote sensing by a Markov object process
In this paper, we rely on the theory of marked point processes to perform an unsupervised road network extraction from optical and radar images. A road network is modeled by a Mar...
Caroline Lacoste, Xavier Descombes, Josiane Zerubi...
ICPR
2002
IEEE
14 years 9 months ago
Recognition of Gestures in the Context of Speech
The scope of this paper is the interpretation of a user's intention via a video camera and a speech recognizer. In comparison to previous work which only takes into account g...
Matthieu Bray, Hedvig Sidenbladh, Jan-Olof Eklundh
CCS
2010
ACM
14 years 3 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
SEUS
2009
IEEE
14 years 2 months ago
Fine-Grained Tailoring of Component Behaviour for Embedded Systems
Abstract. The application of run-time reconfigurable component models to networked embedded systems has a number of significant advantages such as encouraging software reuse, ada...
Nelson Matthys, Danny Hughes, Sam Michiels, Christ...